Escalating privileges
Once a machine is compromised, any access obtained is usually with low privileges. As the idea of any pen test is to simulate a real-world attack, this includes looking for sensitive information, which is normally kept on restricted servers; the tester would need to find ways to escalate their privileges. In a Windows Active Directory (AD) environment, this would mean getting access to a Domain Admin account.
推薦閱讀
- Node Security
- 白話網(wǎng)絡(luò)安全2:網(wǎng)安戰(zhàn)略篇
- 科技安全:戰(zhàn)略實踐與展望
- 腦洞大開:滲透測試另類實戰(zhàn)攻略
- 網(wǎng)絡(luò)安全保障能力研究
- 白帽子講Web安全(紀(jì)念版)
- 反黑命令與攻防從新手到高手(微課超值版)
- 云原生安全技術(shù)實踐指南
- 數(shù)據(jù)安全領(lǐng)域指南
- 網(wǎng)絡(luò)安全應(yīng)急響應(yīng)實戰(zhàn)
- 從實踐中學(xué)習(xí)密碼安全與防護(hù)
- 實用黑客攻防技術(shù)
- 捍衛(wèi)隱私
- 企業(yè)數(shù)據(jù)安全防護(hù)指南
- 網(wǎng)絡(luò)空間安全法律問題研究